Follow

Submissions from 2011

Link

Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith

Link

The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith

Link

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks

Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill

Link

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

PDF

An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs

Link

Responding to Emerging Challenges: Multilateral Environmental Agreements and Highly Pathogenic Avian Influenza H5N1, Ruth Cromie, Nick Davidson, Colin Galbraith, Ward Hagemeijer, Pierre Horwitz, Rebecca Lee, Taej Mundkur, and David Stroud

Link

Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee

Link

Survival and Population Size of the Frog Heleioporus Albopunctatus in a Highly Modified, Agricultural Landscape, Robert Davis and J Roberts

Link

Diversity and composition of ectomycorrhizal community on seedling roots: the role of host preference and soil origin, Qiong Ding, Yu Liang, Pierre Legendre, Xin-hua He, Ke-quan Pei, Xiao-jun Du, and Ke-ping Ma

Link

A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks

Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks

Link

Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald

Link

Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald

Link

Linking hydraulic conductivity and photosynthesis to water-source partitioning in trees versus seedlings, Paul L. Drake, Ray H. Froend, and Peter J. Franks

Link

Long-term pig manure application reduces the requirement of chemical phosphorus and potassium in two rice-wheat sites in subtropical China, YingHua Duan, M Xu, Xinhua He, Shuanglai Li, and X Sun

PDF

Risk-based intervention profiling in complex environments (impacted by time-restricted conditions), Joseph D. Ducie

PDF

High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston

PDF

Model based test suite minimization using metaheuristics, Usman Farooq

Link

Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield

PDF

Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla

Link

Factors Affecting the Distribution of Nutrients in the Tree Organs of Eucalyptus Camaldulensis in the Arid Lands of Western Australia, Hiroyuki Hamano, Noriko Saito, Yoshiko Tanaka, Shigeru Kato, Kiyotaka Tahara, Nobuhide Takahashi, Koichi Yamada, and Toshinori Kojima

PDF

Kindle Forensics: Acquisition and Analysis, Peter Hannay

Link

GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard

Link

Red teaming with coevolution, Philip Hingston and Mike Preuss

Link

A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds

Link

Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds

Link

Access to Inland Waters for Tourism: Ecosystem Services and Trade-offs, Pierre Horwitz and M Carter

PDF

The relationship between water, health and global environmental change, as interpreted through five key Multilateral Environmental Agreements (MEAs), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, and Jo Mulongoy

PDF

A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng

PDF

Assessing practical laboratory skills in undergraduate molecular biology courses, Lynne Hunt, Annette Koenders, and Vidar Gynnild

Link

A longitudinal study of wi-fi access point security inthe Perth central business district, Emil Jacobson and Andrew Woodward

Link

Quantifying the effect of graphical password guidelines for better security, Mohd Jali and Steven Furnell

Link

Are Existing Security Models Suitable for Teleworking?, Peter James

Link

A Secure Portable Application Device to Support Network Centric Warfare, Peter James

Link

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

Link

Security aspects of sensor-based defence systems, Michael N. Johnstone

Link

Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis

Regulator Guidance and Legislation Relevant to Pit Lakes, Hugh Jones and Clinton Mccullough

Link

Sequential anaerobic-aerobic treatment of azo dyes: Decolourisation and amine degradability, M. Jonstrup, Naresh K. Radhakrishnan, M. Murto, and B. Mattiasson

Link

Information evaluation: How one group of intelligence analysts go about the task, John Joseph and Jeff Corkill

Link

Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework, Mahmoud Khonji, Y Iraqi, and Andrew Jones

Link

Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Lexical URL analysis for discriminating phishing and legitimate websites, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

A study of feature subset evaluators and feature subset searching methods for phishing classification, Mahmoud Khonji, Andrew Jones, and Youssef Iraqi

Link

Forces that structure plant communities: quantifying the importance of the mycorrhizal symbiosis, J. Klironomos, M. Zobel, M. Tibbett, William D. Stock, M.C. Rillig, J.L. Parrent, M. Moora, A.M. Koch, J.M. Facelli, E. Facelli, I.A. Dickie, and J.D. Bever

Link

Considering Complexity Theory in Understanding Information Management in Health Systems, Shirlee-ann Knight

Link

Information Management in Health Systems: Considering an Organic Approach, Shirlee-ann Knight

PDF

The Combined Conceptual Life Cycle Model of Information Quality in User Perceptions of IQ On The Web, Shirlee-ann Knight

Link

The combined conceptual life-cycle model of information quality: Part 1, an investigative framework, Shirlee-ann Knight

PDF

A Preliminary Introduction to the OTAM: Exploring Users’ Perceptions of their on-going Interaction with Adopted Technologies, Shirlee-ann Knight and Janice M. Burn

PDF

Alarm management: Mining for groups of co-occuring alarm tags, Savo Kordic

Link

Assessing wetland ecosystem services and poverty interlinkages: A general framework and case study, Ritesh Kumar, Pierre Horwitz, G. Randy Milton, Sonali Sellamuttu, Sebastian Buckton, Nick Davidson, Ajit Pattnaik, Monica Zavagli, and Chris Baker

Link

Risk assessment for mobile devices, Thomas Ledermuller and Nathan L. Clarke

Link

A Rough-fuzzy Hybrid Approach on a Neuro-Fuzzy Classifier for High Dimensional Data, Chang Su Lee

Link

Feature Reduction using a GA-Rough Hybrid Approach on Bio-medical data, Chang Su Lee

Link

Rough-fuzzy Hybrid Approach for Identification of Bio-Markers and Classification on Alzheimer's Disease Data, ChangSu Lee, Chiou-Peng Lam, and Martin Masek

Link

A rapid quantitative determination of phenolic acids in Brassica oleracea by capillary zone electrophoresis, Iris Lee, Mary Boyce, and Michael Breadmore

PDF

Reinforcement learning of competitive and cooperative skills in soccer agents, Jinsong Leng and Chee Lim

Link

Outliers Detection with Correlated Subspaces for High Dimensional Datasets, Jinsong T. Leng and Zhihu Huang

Link

An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island, John Letch, Ellice Mcglinn, Jonathan Bell, Emma Downing, and David Cook

Link

Long-term combined application of manure and NPK fertilizers influenced nitrogen retention and stabilization of organic C in Loess soil, Bin Liang, Xueyun Yang, Xinhua He, Daniel Murphy, and Jianbin Zhou

Link

Effects of 17-year Fertilization on Soil Microbial Biomass C and N and Soluble Organic C and N in Loessial Soil During Maize Growth, Bin Liang, Xueyun Yang, Xinhua He, and Jianbin Zhou

PDF

Behaviour Profiling for Transparent Authentication for Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Misuse detection for mobile devices using behaviour profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Engineering design of strategies for winning iterated prisoner's dilemma competitions, Jiawei Li, Philip Hingston, and Graham Kendall

Link

Nitrite, Sodium Nitroprusside, Potassium Ferricyanide and Hydrogen Peroxide Release Dormancy of Amaranthus Retroflexus Seeds in a Nitric Oxide-Dependent Manner, Xuanyu Liu, Zhijun Deng, Hongyan Cheng, Xinhua He, and Songquan Song

Link

Rapid Change of AM Fungal Community in a Rain-Fed Wheat Field With Short-Term Plastic Film Mulching Practice, Yongjun Liu, Lin Mao, Xinhua He, Gang Cheng, Xiaojun Ma, Lizhe An, and Huyuan Feng

Link

Meeting Environmental Goals for Pit Lake Restoration - Factoring in the Biology, Mark A. Lund and Clint D. McCullough

Link

How representative are pit lakes of regional natural water bodies? A case study from silica sand mining, Mark A. Lund and Clinton D. Mccullough

Link

Habitat surrounding patch reefs influences the diet and nutrition of the western rock lobster, Lachlan Macarthur, D L Phillips, Glenn Hyndes, Christine Hanson, and Mathew Vanderklift

Link

Australian primary care health check: who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams

PDF

Student opinions on their development of non-technical skills in IT education, W Makasiranondh, S Maj, and D Veal

PDF

An investigation into internetworking education, Woratat Makasiranondh

PDF

A pedagogical rich interactive on-line learning platform for Network Technology students in Thailand, Woratat Makasiranondh, Stanislaw Maj, and David Veal

An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Masood Mansoori and Ray Hunt

Link

An Evaluation of Data Erasing Tools, Thomas Martin and Andrew Jones

PDF

Managing Multidisciplinary Student Design Teams, Martin Masek, Joo Jung, and Barnard Clarkson

Link

Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams

PDF

Ecological Restoration of Novel Lake Districts: New Approaches for New Landscapes, Clinton D. McCullough and Eddie J. Van Etten

Link

Bioremediation of Acidic and Metalliferous Drainage (AMD) through organic carbon amendment by municipal sewage and green waste, Clinton Mccullough and Mark Lund

PDF

Limiting factors for crayfish and finfish in acidic coal pit lake, Clinton McCullough and Mark Lund

PDF

Recovery from the impact of light reduction on the seagrass Amphibolis griffithii, insights for dredging management, Kathryn McMahon, Paul Lavery, and Michael Mulligan

Link

Linking Land and Sea: Different Pathways for Marine Subsidies, Kajsa Mellbrand, Paul S. Lavery, Glenn A. Hyndes, and Peter A. Hamback

Link

Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok, Atif Ahmad, and Shanton Chang

PDF

Model-based Investigations of Acidity Sources and Sinks of a Pit Lake in Western Australia, Mike Mueller, katja Eulitz, Clinton McCullough, and Mark Lund

Link

Nitrogen Deposition Effects on Mediterranean-type Ecosystems: An Ecological Assessment, Raul Ochoa-Hueso, Edith Allen, Cristina Branquinho, Cristina Cruz, Teresa Dias, Mark Fenn, Esteban Manrique, M. Perez-Corona, Lucy Sheppard, and William Stock

Link

Empowering protest through social media, Simon O'Rourke

Link

Spatial and Temporal Visualisation Techniques for Crash Analysis, Charlotte S. Plug, Jianhong Xia, and Craig Caulfield

Link

Can current packet analysis software detect BitTorrent activity or extract files from BTP and μTP traffic streams?, William Pung and Andrew Woodward

Link

Critical infrastructure Protection: An Ethical Choice, Graeme Pye, Matthew Warren, and William Hutchinson

Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments, Yongrui Qin, Hua Wang, and Jitian Xiao

Link

Sourcing Organic Materials for Pit Lake Bioremediation in Remote Mining Regions, Naresh D. Radhakrishnan, Clinton D. Mccullough, Mark A. Lund, and Michelle L. Newport

Link

How does storage affect the quality and quantity of organic carbon in sewage for use in the bioremediation of acidic mine waters?, Naresh K. Radhakrishnan, Clinton D. Mccullough, and Mark A. Lund

Link

Bacterial sulfate reduction based ecotechnology for remediation of acidic pit lakes, Naresh Radhakrishnan, Clinton Mccullough, and Mark Lund

PDF

Potential of sewage and green waste for acidic pit lake bioremediation, Naresh Radhakrishnan, Clinton McCullough, and Mark Lund

PDF

Evaluating the factors limiting algal biomass in acidic pit lakes of the Collie lake district, Western Australia, Naresh Radhakrishnan, Clinton McCullough, Mark Lund, and Santiago Larranaga Arrizabalaga

PDF

Metal exposure in non-occupationally exposed pregnant women of Western Australia and contribution of environmental sources, Malarvili Ramalingam